Fluff

Dirtection Inc: episode 2

fluff-headerThe secret history of fluff - now it’s war...
People often ask me if it’s boring. The job, I mean – cleaning other people’s computers. “Boring?” I say,
“Is white-water rafting boring? Is tightrope walking over Niagara Falls boring? Is swimming naked with man-eating sharks boring?” If they are being honest, they generally say “No,” or “Probably not”. At which point I snap my fingers, affect a smirk of superiority and say, “Pah! Dull as dishwater compared to cleaning computers!”
   
Server

Monitoring servers remotely

Staying on top of customer servers without making a visit using logs, scripts and consoles – and how Windows Server 2008 helps

   
SecurityClient

Offering Consultancy on Email Compliance Issues

If you ask your customers what they know about legislation involving data, the chances are you’ll be horrified by the answers.

   
The Business

Partner Focus: Peter-Hortensius-Lenovo

The computer maker Lenovo has 9% of the worldwide PC market, and in 2009 it ranked as the world’s fast-est-growing PC company. In the three months to December 31st, Lenovo grew sales by 42%, against an industry av-erage of 17%. We asked Lenovo what that means for small business resellers.

   
ServerNetworkClient

Netbooks: Networking and Managing a Linux portable

Linux netbooks are cheap, popular and probably on a customer site already. How can you connect them to an existing network and make them work with Windows servers and applications?

 
   
Security

All-Access Pass

Good security requires good passwords. But good security is as much about ensuring access by authorised users as it is about preventing access by interlopers. Recovering, resetting, or removing passwords is sometimes a necessity. Here’s how.

   
Server

Set up Exchange anti-spam features

Move anti-spam settings from one server to another with the Exchange 2007 Anti Spam Migration tool, from Microsoft www.microsoft.com/do.. Run it on the SBS 2003 system to create a PowerShell script that you can run on your Exchange 2007 server to import the appropriate settings.

   
SecurityClient

Get better security with Vista by implementing best practices for using User Account Control - UAC

Operating your PC when you’re logged in with an Administrator account is an inherently insecure thing to do. If you’re a user with highly-elevated privileges across multiple machines or an entire Active Directory domain, running your everyday processing with these privileges can be dangerous to the point of negligence.

   
ClientClient Resources

The architecture of VDI

The architecture for VDI is really very simple and the basics do not differ between the various VDI vendors. 

   
ServerThe Business

GFI tools for management

Keep track of customer servers and workstations with this remote monitoring and management software.

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

  businesses Governance, risk and compliance aren't just for big business, and they're not just a burden of red tape. The better the governance, risk and compliance policies of a company, the better it does at business. This guidance from the IT Policy Compliance Group is specifically written for small business; take a look to see what you should be recommending strategically. http://www.itpolicycompliance.com/guidance/smb_special_interests/ read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS